{"vulnerability": "CVE-2023-2805", "sightings": [{"uuid": "dfc25370-b05e-44b9-a16b-8b6658984fd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28055", "type": "seen", "source": "https://t.me/cibsecurity/71061", "content": "\u203c CVE-2023-28055 \u203c\n\nDell NetWorker, Version 19.7 has an improper authorization vulnerability in the NetWorker client. An unauthenticated attacker within the same network could potentially exploit this by manipulating a command leading to gain of complete access to the server file further resulting in information leaks, denial of service, and arbitrary code execution. Dell recommends customers to upgrade at the earliest opportunity.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-27T18:36:00.000000Z"}, {"uuid": "bd4c8844-d952-446c-9265-8c599c88cf36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2805", "type": "seen", "source": "https://t.me/cibsecurity/65334", "content": "\u203c CVE-2023-2805 \u203c\n\nThe SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the agents[] parameter in the set_add_agent_leaves AJAX function before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-19T14:25:26.000000Z"}, {"uuid": "dd13316f-8f4d-4306-a7b3-0217118dbca0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28053", "type": "seen", "source": "https://t.me/ctinow/167143", "content": "https://ift.tt/zQtL0mj\nCVE-2023-28053 | Dell NetWorker Virtual Edition 19.7.0.5/19.8.0.3/19.9.0.2 SSH risky encryption (dsa-2023-358)", "creation_timestamp": "2024-01-12T09:11:44.000000Z"}]}